50% found this document useful (2 votes)
8K views165 pages

Cyber Security All 5 Unit Notes

Uploaded by

ajha49254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
8K views165 pages

Cyber Security All 5 Unit Notes

Uploaded by

ajha49254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 165

AKTU CYBER SECURITY BCC-301 (3rd Sem)

Unit :-1 BCC-401 (4th Sem)

INTRODUCTION TO CYBER CRIME


The word “Cybercrime” was first coined in 1982 by
William Gibson but it gained popularity in 1984 through
his novel 'Neuromancer'.

Akash Arora (1999) was one of the earliest examples


of cybercrime in India. (Yahoo Case)
According to the 2020 Cost of Cybercrime Study by
Accenture, the average number of security breaches
experienced by organizations increased by 11%
between 2018 and 2019. Cybercrime is also becoming
more sophisticated, with the emergence of new
threats such as ransomware and advanced
persistent threats (APTs)
Cybercrime Era: Survival Mantra for the Netizens
CYBER SECURITY
AKTU Unit:-2 BCC-301 (3rd Sem)
BCC-401 (4th Sem)
CYBER CRIME
Mobile and Wireless Devices :-
SmartPhones combine the best
aspects of mobile and wireless
technologies and blend them into
a useful business tool.
Cyber Security
Unit :- 3
TOOLS AND METHODS USED IN CYBERCRIME
Cyber Security
Unit :- 4
Understanding Computer Forensics
Cyber Security
Unit :- 5

INTRODUCTION TO SECURITY POLICIES AND CYBER LAWS


Cyber Security
AKTU Important Topics
Unit :- 1
> Long Questions :
1. Cyber Crime - Definition + Origin + Types

2. Social Engineering - Example + Classification

3. How Criminals Plan the Attacks

4. Cyber Stalking - Types + Working

5. Botnets and Attack Vector + Diagram


> Two Marks Questions :

1. Information Security (CIA Triad)

2. Cyber Criminals

3. A Global Perspective on Cyber Crime

4. Survival Mantra for Netizens

5. Cyber Cafe and its Safety Tips


Unit :- 2
1. Proliferation of Mobile and Wireless Devices

2. Credit Card Frauds in Mobile and Wireless Devices

3. Attacks on Mobile / Security Challenges

4. Mobile Devices : Security Implications for Organizations

5. Organizational Measures for Mobile


> Two Marks Questions :
1. Mobile and Wireless Devices

2. Trends in Mobility

3. Mobile Viruses
Unit :- 3
1. Proxy Server and Anonymizers

2. Phising and Identity Theft

3. Virus and Worms / DoS and DDoS Attacks

4. SQL Injection and Buffer Overflow


> Two Marks Questions :
1. Introduction - Stages of Attack

2. Steganography

3. Password Cracking / Keyloggers / Spywares

4. Trojan Horses and Backdoors


Unit :- 4
1. Computer Forensics - Definition + Function + Needs

2. Forensic Analysis of E-Mail and Tools

3. Digital Forensic Life Cycle / Chain of Custody

4. Challenges in Computer Foresics


> Two Marks Questions :
1. Digital Forensics

2. Digital Evidence

3. Network Forensics

4. Forensics and Social Networking Sites


Unit :- 5
1. Information Security Policy and its Needs

2. Cyber Law - Importance

3. The Digital Personal Data Protection Bill 2023

4. Intellectual Property and its Legislation and Issues

> Two Marks Questions :


1. Indian Cyber Law

2. Patents and Copyrights

3. Trademark
THANK YOU!!

I-TECH WORLD (AKTU)


JOIN TELEGRAM GROUP FOR HAND
WRITTEN NOTES , QUANTUMS AND
OTHER STUDY MATERIAL.
LINK GIVEN IN DESCRIPTION BOX

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy